Apple Mac OS X does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html | Broken Link |
http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf | Broken Link |
http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:13:42
Updated: 2022-10-03T16:13:42
Reserved: 2022-10-03T00:00:00
Link: CVE-2008-3438
JSON object: View
NVD Information
Status : Analyzed
Published: 2008-08-01T14:41:00.000
Modified: 2024-02-15T20:13:01.057
Link: CVE-2008-3438
JSON object: View
Redhat Information
No data.
CWE